2021-09-29 17:27:13 +02:00
|
|
|
upstream php-handler {
|
|
|
|
server unix:/run/php/php-fpm.sock;
|
|
|
|
}
|
|
|
|
|
2016-04-05 08:44:23 +02:00
|
|
|
server {
|
|
|
|
listen 80;
|
|
|
|
listen [::]:80;
|
|
|
|
|
2019-05-20 20:55:05 +02:00
|
|
|
server_name {{ nextcloud_domain }};
|
2016-04-05 08:44:23 +02:00
|
|
|
|
2016-04-09 23:42:13 +02:00
|
|
|
location /.well-known/acme-challenge {
|
2016-04-05 08:44:23 +02:00
|
|
|
default_type "text/plain";
|
2016-04-09 23:42:13 +02:00
|
|
|
alias /var/www/acme-challenge;
|
2016-04-05 08:44:23 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
location / {
|
2019-05-20 20:55:05 +02:00
|
|
|
return 301 https://{{ nextcloud_domain }}$request_uri;
|
2016-04-09 22:01:50 +02:00
|
|
|
}
|
2016-04-05 08:44:23 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
server {
|
|
|
|
listen 443 ssl http2;
|
|
|
|
listen [::]:443 ssl http2;
|
|
|
|
|
2019-05-20 20:55:05 +02:00
|
|
|
server_name {{ nextcloud_domain }};
|
2016-04-05 08:44:23 +02:00
|
|
|
|
2019-05-20 20:55:05 +02:00
|
|
|
ssl_certificate_key /etc/nginx/ssl/{{ nextcloud_domain }}.key;
|
|
|
|
ssl_certificate /etc/nginx/ssl/{{ nextcloud_domain }}.crt;
|
2016-04-05 08:44:23 +02:00
|
|
|
|
2021-09-29 17:27:13 +02:00
|
|
|
# TODO enable anonymized in global config
|
|
|
|
#access_log /var/log/nginx/access.log anonymized;
|
|
|
|
|
2016-04-06 10:10:06 +02:00
|
|
|
# Add headers to serve security related headers
|
2016-04-09 22:01:50 +02:00
|
|
|
add_header Strict-Transport-Security "max-age=15768000; includeSubDomains; preload;";
|
2016-04-06 10:10:06 +02:00
|
|
|
add_header X-Content-Type-Options nosniff;
|
2021-09-29 17:27:13 +02:00
|
|
|
add_header X-Frame-Options "SAMEORIGIN";
|
2016-04-06 10:10:06 +02:00
|
|
|
add_header X-XSS-Protection "1; mode=block";
|
|
|
|
add_header X-Robots-Tag none;
|
2016-04-12 16:52:27 +02:00
|
|
|
add_header X-Download-Options noopen;
|
|
|
|
add_header X-Permitted-Cross-Domain-Policies none;
|
2019-05-20 20:55:05 +02:00
|
|
|
add_header 'Referrer-Policy' 'no-referrer';
|
2016-04-06 10:10:06 +02:00
|
|
|
|
2019-05-20 20:55:05 +02:00
|
|
|
# Remove X-Powered-By, which is an information leak
|
|
|
|
fastcgi_hide_header X-Powered-By;
|
|
|
|
|
|
|
|
root /var/www/nextcloud/;
|
2016-04-05 08:44:23 +02:00
|
|
|
|
2016-04-05 09:19:27 +02:00
|
|
|
# set max upload size
|
|
|
|
client_max_body_size 1G;
|
|
|
|
fastcgi_buffers 64 4K;
|
|
|
|
|
2021-09-29 17:27:13 +02:00
|
|
|
index index.php index.html /index.php$request_uri;
|
2016-04-05 09:19:27 +02:00
|
|
|
|
2021-09-29 17:27:13 +02:00
|
|
|
|
|
|
|
location ^~ /loleaflet {
|
|
|
|
proxy_pass http://localhost:9980;
|
|
|
|
proxy_set_header Host $http_host;
|
2016-04-12 17:02:20 +02:00
|
|
|
}
|
|
|
|
|
2021-09-29 17:27:13 +02:00
|
|
|
location ^~ /hosting/discovery {
|
|
|
|
proxy_pass http://localhost:9980;
|
|
|
|
proxy_set_header Host $http_host;
|
2016-04-05 09:19:27 +02:00
|
|
|
}
|
2021-09-29 17:27:13 +02:00
|
|
|
|
|
|
|
location ^~ /hosting/capabilities {
|
|
|
|
proxy_pass http://localhost:9980;
|
|
|
|
proxy_set_header Host $http_host;
|
2019-05-20 20:55:05 +02:00
|
|
|
}
|
|
|
|
|
2021-09-29 17:27:13 +02:00
|
|
|
location ~ ^/lool/(.*)/ws$ {
|
|
|
|
proxy_pass http://localhost:9980;
|
|
|
|
proxy_set_header Upgrade $http_upgrade;
|
|
|
|
proxy_set_header Connection "Upgrade";
|
|
|
|
proxy_set_header Host $http_host;
|
|
|
|
proxy_read_timeout 36000s;
|
|
|
|
}
|
2016-04-05 09:19:27 +02:00
|
|
|
|
2021-09-29 17:27:13 +02:00
|
|
|
location ~ ^/lool {
|
|
|
|
proxy_pass http://localhost:9980;
|
|
|
|
proxy_set_header Host $http_host;
|
2019-05-20 20:55:05 +02:00
|
|
|
}
|
|
|
|
|
2021-09-29 17:27:13 +02:00
|
|
|
location ^~ /lool/adminws {
|
|
|
|
proxy_pass http://localhost:9980;
|
|
|
|
proxy_set_header Upgrade $http_upgrade;
|
|
|
|
proxy_set_header Connection "Upgrade";
|
|
|
|
proxy_set_header Host $http_host;
|
|
|
|
proxy_read_timeout 36000s;
|
2016-04-05 09:19:27 +02:00
|
|
|
}
|
|
|
|
|
2021-09-29 17:27:13 +02:00
|
|
|
|
|
|
|
# Rule borrowed from `.htaccess` to handle Microsoft DAV clients
|
|
|
|
location = / {
|
|
|
|
if ( $http_user_agent ~ ^DavClnt ) {
|
|
|
|
return 302 /remote.php/webdav/$is_args$args;
|
|
|
|
}
|
2016-04-05 09:19:27 +02:00
|
|
|
}
|
|
|
|
|
2021-09-29 17:27:13 +02:00
|
|
|
location = /robots.txt {
|
|
|
|
allow all;
|
|
|
|
log_not_found off;
|
|
|
|
access_log off;
|
|
|
|
}
|
|
|
|
|
|
|
|
# Make a regex exception for `/.well-known` so that clients can still
|
|
|
|
# access it despite the existence of the regex rule
|
|
|
|
# `location ~ /(\.|autotest|...)` which would otherwise handle requests
|
|
|
|
# for `/.well-known`.
|
|
|
|
location ^~ /.well-known {
|
|
|
|
# The following 6 rules are borrowed from `.htaccess`
|
|
|
|
|
|
|
|
location = /.well-known/carddav { return 301 /remote.php/dav/; }
|
|
|
|
location = /.well-known/caldav { return 301 /remote.php/dav/; }
|
|
|
|
# Anything else is dynamically handled by Nextcloud
|
|
|
|
location ^~ /.well-known { return 301 /index.php$uri; }
|
|
|
|
|
|
|
|
try_files $uri $uri/ =404;
|
|
|
|
}
|
|
|
|
|
|
|
|
# Rules borrowed from `.htaccess` to hide certain paths from clients
|
|
|
|
location ~ ^/(?:build|tests|config|lib|3rdparty|templates|data)(?:$|/) { return 404; }
|
|
|
|
location ~ ^/(?:\.|autotest|occ|issue|indie|db_|console) { return 404; }
|
|
|
|
|
|
|
|
# Ensure this block, which passes PHP files to the PHP process, is above the blocks
|
|
|
|
# which handle static assets (as seen below). If this block is not declared first,
|
|
|
|
# then Nginx will encounter an infinite rewriting loop when it prepends `/index.php`
|
|
|
|
# to the URI, resulting in a HTTP 500 error response.
|
|
|
|
location ~ \.php(?:$|/) {
|
|
|
|
fastcgi_split_path_info ^(.+?\.php)(/.*)$;
|
|
|
|
set $path_info $fastcgi_path_info;
|
|
|
|
|
|
|
|
try_files $fastcgi_script_name =404;
|
|
|
|
|
2016-04-05 09:19:27 +02:00
|
|
|
include fastcgi_params;
|
2016-04-05 08:44:23 +02:00
|
|
|
fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name;
|
2021-09-29 17:27:13 +02:00
|
|
|
fastcgi_param PATH_INFO $path_info;
|
2016-04-05 09:19:27 +02:00
|
|
|
fastcgi_param HTTPS on;
|
2021-09-29 17:27:13 +02:00
|
|
|
|
|
|
|
fastcgi_param modHeadersAvailable true; # Avoid sending the security headers twice
|
|
|
|
fastcgi_param front_controller_active true; # Enable pretty urls
|
|
|
|
fastcgi_pass php-handler;
|
|
|
|
|
2016-04-05 09:19:27 +02:00
|
|
|
fastcgi_intercept_errors on;
|
2019-05-20 20:55:05 +02:00
|
|
|
fastcgi_request_buffering off;
|
|
|
|
}
|
|
|
|
|
2021-09-29 17:27:13 +02:00
|
|
|
location ~ \.(?:css|js|svg|gif)$ {
|
2019-05-20 20:55:05 +02:00
|
|
|
try_files $uri /index.php$request_uri;
|
2021-09-29 17:27:13 +02:00
|
|
|
expires 6M; # Cache-Control policy borrowed from `.htaccess`
|
|
|
|
access_log off; # Optional: Don't log access to assets
|
2016-04-12 17:02:20 +02:00
|
|
|
}
|
2019-05-20 20:55:05 +02:00
|
|
|
|
2021-09-29 17:27:13 +02:00
|
|
|
location ~ \.woff2?$ {
|
2019-05-20 20:55:05 +02:00
|
|
|
try_files $uri /index.php$request_uri;
|
2021-09-29 17:27:13 +02:00
|
|
|
expires 7d; # Cache-Control policy borrowed from `.htaccess`
|
|
|
|
access_log off; # Optional: Don't log access to assets
|
2019-05-20 20:55:05 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2021-09-29 17:27:13 +02:00
|
|
|
location / {
|
|
|
|
try_files $uri $uri/ /index.php$request_uri;
|
2019-05-20 20:55:05 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
# collabora static files
|
|
|
|
location /drawio {
|
|
|
|
access_log off;
|
|
|
|
alias /var/www/drawio/src/main/webapp;
|
|
|
|
index index.html;
|
|
|
|
location ~ ^/drawio/(.*\.(html|xml|js|css|gif|jpg|png))$ {
|
|
|
|
alias /var/www/drawio/src/main/webapp/$1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-04-05 08:44:23 +02:00
|
|
|
}
|